Supporting the Community of Faith
Sean Lyngaas, @snlyngaas, writing in CyberScoop last week, wrote, "When it comes to protecting faith-based organizations from hackers, divine intervention will only get you so far." And he's right! Security, like other activities we may give prayer to, still requires...
Security Spotlight: An Interview with WaterISAC Managing Director Michael Arceneaux
US critical infrastructure, most recently defined in President Obama’s 2013 Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience, is presently comprised of sixteen sectors[1]. Among these are several “critical lifeline” sectors,...
Blended Threats: The Oracle Has Spoken!
In this blog, we’ve written a few times about the idea of “Blended Threats,” and some of the ways the critical infrastructure community is proactively leaning forward in planning for them - such as in the healthcare and higher education sectors. Recently, there have...
PERSPECTIVE: Spotting Pre-Attack Planning Indicators to Disrupt the Hostile Events Cycle
By David Pounder This is the third and final part of an ongoing series focused on the Hostile Events Attack Cycle. To this point, the attacker has gone through the planning and preparation stages necessary to identify a target, visualize the attack, and plan for the...
Observations on the Unite the Right Rally, from White Nationalists to Antifa
By Bridget Johnson (@BridgetCJ) Much of the action at Saturday’s Unite the Right rally in Washington took place off the court, as social media users pushed messaging that the small turnout indicated that supremacist groups aren’t a problem (homeland security...
Higher Education: A Complex Array of Threats
By Brett Zupan There is a tremendous amount of information that analysts, security and risk leaders, executives, and others try to process daily. In the abundance of noise, we strive to promote a simple idea to developing a threat-informed, risk-based approach...